How does an attacker use a zero-day vulnerability during the Incursion phase?
How does an attacker use a zero-day vulnerability during the Incursion phase?
A . To perform a SQL injection on an internal server
B . To extract sensitive information from the target
C . To perform network discovery on the target
D . To deliver malicious code that breaches the target
Answer: D
Explanation:
Reference: https://www.symantec.com/connect/blogs/guide-zero-day-exploits
Latest 250-441 Dumps Valid Version with 70 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments